This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR ...
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
nomic Management Abstractions M. Aldinucci1 , M. Danelutto1 , and P. Kilpatrick2 1 Dept. Computer Science, Univ. of Pisa, Italy 2 Dept. Computer Science, Queen's Univ. of Belf...
Marco Aldinucci, Marco Danelutto, Peter Kilpatrick
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
This paper investigates the problem of Partitioning Skew1 in MapReduce-based system. Our studies with Hadoop, a widely used MapReduce implementation, demonstrate that the presence ...
Shadi Ibrahim, Hai Jin, Lu Lu, Song Wu, Bingsheng ...